Security experts note that a new wave of malware browser extensions have been plagued computer users around the world. The Nyoogle redirect (known under its full name Nyoogle – Custom Logo for Google) has been found to be among the newly released viruses targeting end users. It is able to misconfigure the victim applications and cause a lot of security and privacy activities including the delivery of other threats.
|Type||Browser Hijacker, PUP|
|Short Description||The redirect can change the homepage, search engine and new tab on each browser installed on the compromised machine.|
|Symptoms||Depending on the exact redirect configuration different behaviour patterns can be executed. The list includes user redirection, malware infections and etc.|
|Distribution Method||Freeware Installations, Bundled Packages|
|Detection Tool|| See If Your System Has Been Affected by Nyoogle |
Malware Removal Tool
|User Experience||Join Our Forum to Discuss Nyoogle.|
Nyoogle Redirect – Distribution
The primary distribution technique used by the Nyoogle redirect is the creation of dangerous copies of it in the official software repositories of the most popular web browsers. The fact that the malware group behind it have created versions for the most popular applications shows that their intentions are to impact as many users as possible. Such is the case of this particular threat as it has been made compatible with the most poopular applications: Mozilla Firefox, Google Chrome, Opera, Safari, Microsoft Edge and Internet Explorer.
It is being advertised as quick and easy Google logo changer. A sample description reads the following:
Replace the Google logo with any logo !
Hey, do you want to change the Google logo? Do it now with Nyoogle !
Custom text, custom image :)
– Google Nyoogle : Custom Logo for Google Chrome
– Extension for fun only, free to use.
Another strategy that is often employed in similar cases is the distribution of malware software installers. These bundles are contain legitimate installers taken from the official software providers and then modified to include the Nyoogle redirect code. In some cases it may be possible to disallow the installation if the victims uncheck certain options during the setup process.
Email messages that use templates may be used in order to deliver the attacks in multiple ways. Social engineering is almost always used and there are three primary ways of infecting users via this method:
- Hyperlinks —The messages can contain links to hosted instances of the Nyoogle redirect. They can be disguised as useful software or other files that the users may find interesting.
- File Attachments — The installers can be bundled directly to the messages either as setup files or archives.
- Infected Documents — The criminals behind the attack can create documents in different formats: rich text documents, spreadsheets, presentations. Once they are opened by the computer users a notification prompt appears which asks them to enable the built-in macros (scripts). If this is done the malware is downloaded from the Internet anad executed directly.
The Nyoogle redirect infections can also be acquired from web scripts that are often part of hacker-controlled sites. They can have many forms including pop-ups, banners, redirects and scripts. By interacting with such elements the victims can get infected with the dangerous code.
Nyoogle Redirect – In Detail
The Nyoogle redirect has been found to contain various browser hijacker behavior patterns. Depending on its exact configuration it may alter some of the basic web browser settings including the default home page, search engine and new tabs page. Such modifications are done in order to redirect the users to a hacker-controlled page. As a consequence dangerous can be instituted on the victims. They monitor the users behavior, interests and habits and report the data to the hacker operators. Usually such sites are usually created as part of a network and the acquired data is pooled into a large database that can generate a complete profile of the victim users. There are two primary types of information:
- Anonymous Data — This category represents represents statistical information such as the type of web browser and version impacted.
- Personally-Identifiable Information — The harvested data of this type can directly expose the victims identity. As the infections happen from the browsers the hackers gain access to the stored history, cookies, bookmarks, preferences, account credentials and passwords.
Advanced configuration and hacker tactics can use the existing infection to deliver additional malware to the compromised computers. This is an effective solution when the operators plan a complex infection. In such cases system changes can follow that can impact the operating system as a whole. This can result in modifications to important configuration files, boot options and the Windows registry.
The Nyoogle redirect has also been found to modify the proxy settings. As a result all Internet traffic is relayed through a hacker-controlled server. This gives the hackers the ability to execute Man-in-the-middle attacks and traffic manipulation.
During the investigation the experts discovered other similar threats that operate in roughly the same manner. It is believed that the same hacker or criminal group are behind them — the Lite Bookmarks browser hijacker (associated with the lite-bookmarks [dot] info domain) and the Stickies – Chrome’s Post-it Notes (Google Chrome extension associated with the stickies [dot] pro domain).
How to Remove Nyoogle Redirect
The detailed guide below shows how to remove Nyoogle redirect from all affected browsers and from the PC. In some cases, the manual removal may not be enough to eliminate completely the hijacker. So be advised to run a scan with an advanced anti-malware tool. It will locate all leftovers so you can easily delete them with a few mouse clicks. Furthermore, an active anti-malware tool on the system guarantees its protection from future malware infections.